Tagged - whaling

Develop and Implement a Security Incident Management Program

Organizations face an ever-evolving range of cyberthreats. It is crucial to have a security incident management program to detect, respond, and recover from security...
  • guided implementation icon

Security Incident Management Runbook: Malicious Email

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.

FiRe 2018 in Review, Part II: "Transformational Technologies"

In part two of the FiRe conference review, we continue our session synopses, including The Future of Identity & Online Privacy, World Interrupted: The Cyber...

Retail Has Big Phish to Fry

The rise of e-commerce coupled with society’s newfound dependency on technology has placed a lucrative target on the backs of retailers. Complacency is not an option when...

Training Materials – Phishing

This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on phishing.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us